15 0 eWAG Admin
15 0 eWAG Admin
15 0 eWAG Admin
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY
OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain
version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL
FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phon e numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Cisco ASR 5000 Enhanced Wireless Access Gateway Administration Guide
iii
▀ Contents
iv
Contents ▀
v
▀ Contents
vi
About this Guide
This document pertains to the features and functionality that run on and/or that are related to the Cisco® ASR 5000
Chassis.
vii
About this Guide
▀ Conventions Used
Conventions Used
The following tables describe the conventions used throughout this documentation.
Warning Alerts you of potential personal injury or fatality. May also alert you of potential electrical hazards.
Text represented as commands This typeface represents commands that you enter, for example:
show ip access-list
This document always gives the full form of a command in lowercase letters. Commands
are not case sensitive.
Text represented as a command This typeface represents a variable that is part of a command, for example:
variable show card slot_number
slot_number is a variable representing the desired chassis slot number.
Text represented as menu or sub- This typeface represents menus and sub-menus that you access within a software
menu names application, for example:
Click the File menu, then click New
viii
About this Guide
Contacting Customer Support ▀
ix
About this Guide
▀ Additional Information
Additional Information
Refer to the following guides for supplemental information about the system:
Cisco ASR 5000 Installation Guide
Cisco ASR 5000 System Administration Guide
Cisco ASR 5x00 Command Line Interface Reference
Cisco ASR 5x00 Thresholding Configuration Guide
Cisco ASR 5x00 SNMP MIB Reference
Web Element Manager Installation and Administration Guide
Cisco ASR 5x00 AAA Interface Administration and Reference
Cisco ASR 5x00 GTPP Interface Administration and Reference
Cisco ASR 5x00 Release Change Reference
Cisco ASR 5x00 Statistics and Counters Reference
Release notes that accompany updates and upgrades to the StarOS for your service and platform
x
Chapter 1
Enhanced Wireless Access Gateway Overview
This chapter provides an overview of the Enhanced Wireless Access Gateway (eWAG).
The following topics are covered in this chapter:
Introduction
Platform Requirements
License Requirements
11
Enhanced Wireless Access Gateway Overview
▀ Introduction
Introduction
Providing a consistent subscriber experience and supporting the ever exploding demand for bandwidth to provide data
services in 3G/4G networks is quickly becoming a big challenge for mobile operators. Widely prevalent Wireless Local
Area Network (WLAN) at public hotspots, private corporate networks, and so on have been viewed as providing a
viable alternative to 3G/4G radio and providing a solution to the overloading of radio networks by providing an
offloading solution. These Interworking WLAN (I-WLAN) provide subscriber access to 3G/4G networks making
services offered by operators universally available.
However, due to the inherent un-trusted nature of WLANs, the I-WLAN solution has been designed keeping security
aspects in view and so is based on IPSec. The IPSec-based solution requires a client to be installed on the UE. At this
point in the evolution of subscriber access from WLANs, the UE client has been a major stumbling block in the
deployment of I-WLANs.
On the other hand, trusted Wi-Fi networks provide a unique opportunity in converting WLANs into seamless extensions
of 3G/4G mobile networks, enabling improved subscriber experience, especially indoors which often suffers poor
cellular coverage, as subscribers are able to reach their 3G/4G services via both mobile and Wi-Fi accesses.
The Cisco® eWAG enables Wi-Fi integration into 3G mobile packet core (MPC), allowing clientless UE attached to
trusted Wireless Local Area Networks (WLANs) seamlessly access 3G services. In this case, the UE does not require a
client, it has no dependencies on the Wi-Fi architecture, and does not realize that it is connecting to a 3G network (3G
access is integrated with the normal UE-WLAN attach procedure).
The Cisco® eWAG can be configured in the following modes:
RADIUS-based eWAG — This solution is based on RADIUS accounting messages generated by the WLAN
network. Here the UE attaches to the WLAN network after authentication and acquires an IP address, and then
the Accounting-Start message generated for the UE session from WLAN network is received at eWAG to
create the corresponding 3G session with the GGSN. This means that the 3G network operator will provide the
3G IP address and the UE has already obtained a Wi-Fi IP address during WLAN attachment procedure. So the
mobility between change of access is not possible as the UE changes its location.
For more information on R-eWAG, refer to the RADIUS-based Enhanced Wireless Access Gateway Overview
chapter.
DHCP-based eWAG — This solution is based on the DHCP protocol and uses the IP address allocated by the
GGSN node for the UE attaching to the WLAN network. The IP address is maintained across the access. There
is no separate IP address space like 3G IP address and Wi-Fi IP address. D-eWAG achieves this by acting as
DHCP-Server to the Wi-Fi network and allocating the IP address to the WLAN UE directly when it tries to
attach to the WLAN network.
For more information on D-eWAG, refer to the DHCP-based Enhanced Wireless Access Gateway Overview
chapter.
12
Enhanced Wireless Access Gateway Overview
Platform Requirements ▀
Platform Requirements
The eWAG service is supported on Cisco® ASR 5000 Series chassis running StarOS. The chassis can be configured
with a variety of components to meet specific network deployment requirements. For additional information, refer to the
Installation Guide for the chassis and/or contact your Cisco account representative.
13
Enhanced Wireless Access Gateway Overview
▀ License Requirements
License Requirements
The eWAG is a licensed Cisco product. Separate session and feature licenses may be required. Contact your Cisco
account representative for detailed information on specific licensing requirements. For information on installing and
verifying licenses, refer to the Managing License Keys section of the Software Management Operations chapter in the
System Administration Guide.
14
Chapter 2
RADIUS-based Enhanced Wireless Access Gateway
Overview
This chapter provides an overview of the RADIUS-based Enhanced Wireless Access Gateway (R-eWAG).
The following topics are covered in this chapter:
Product Overview
Feature Description
How it Works
Dependencies and Limitations
15
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Product Overview
The Cisco® eWAG enables Wi-Fi integration into 3G mobile packet core (MPC), allowing clientless UE attached to
trusted Wireless Local Area Networks (WLANs) seamlessly access 3G services. In this case, the UE does not require a
client, it has no dependencies on the Wi-Fi architecture, and does not realize that it is connecting to a 3G network (3G
access is integrated with the normal UE-WLAN attach procedure).
Important: The eWAG enables 3GPP MPC access only from trusted Wi-Fi networks—802.1x for authentication
and Wi-Fi encryption is required.
The eWAG enables Wi-Fi sessions to be anchored on GGSN of the existing 3G networks via the Gn’ interface. On the
data plane, the eWAG accepts Layer 3 Wi-Fi packets, encapsulates them into GTP tunnels and sends them to the
GGSN. In the downlink direction, the eWAG de-capsulates the packets and sends them to the Wi-Fi network.
The unique advantages of the eWAG include:
The Cisco® ASR5000 chassis on which the eWAG is deployed is a high capacity chassis that can support
millions of subscribers on a single chassis. Therefore, a single chassis is likely to support large session/capacity
requirements for several years to come.
The Wi-Fi core does not need any enhancement apart from the Wi-Fi AAA, which must act as a RADIUS
accounting client towards the eWAG, with all data traffic routed to eWAG as the default nexthop.
This solution enables optimal use of existing MPC infrastructure—PCRF, OCS, Billing, and so on. Billing and
other 3G/MPC services such as deep packet inspection (DPI) are available to subscribers attached to Wi-Fi via
the GGSN. Apart from the basic IP services, eWAG enables enhanced services such as offload, video
optimization, and on-deck services to the Wi-Fi UE. It also enables policy and charging for the Wi-Fi network,
and enables service providers to provide seamless service experience for subscribers in Wi-Fi network
regardless of their access type.
16
RADIUS-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
Network Deployments
The R-eWAG can be deployed in any of the following ways:
Stand-alone R-eWAG deployment on an ASR 5000 chassis.
Combo R-eWAG + GGSN deployment on the same ASR 5000 chassis.
Important: In this release, the following deployment options are not fully qualified and are not supported, these
are available only for lab testing purposes.
17
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Important: For information on dependencies and limitations of these deployment options see the Dependencies
and Limitations section.
Network Interfaces
The Gn’ reference point is located between the R-eWAG and the GGSN supporting GTPv1 and GTPv0 protocols. R-
eWAG supports GTP Path messages towards GGSN. Here, the R-eWAG acts as an SGSN and initiates the PDP Context
Creation procedure. For every UE, the R-eWAG creates one GTP tunnel with the GGSN. The UE’s APN and IMSI are
forwarded to the GGSN in the Create PDP Context Request message. This APN is either the subscribed APN from the
HLR for the connecting user, or the locally configured default APN at the R-eWAG.
18
RADIUS-based Enhanced Wireless Access Gateway Overview
Feature Description ▀
Feature Description
This section presents general description of features supported by the R-eWAG.
RADIUS AAA Support
Differentiated Services Code Point Marking
Access Point Name Selection
Quality of Service Profile Selection
GGSN Selection
GGSN Failover Case
Network Address Translation and Application Level Gateway Support
Virtual APN Support
Offline Charging Support
UE Identity and Location Information Support
Lawful Intercept Support
Bulk Statistics Support
Threshold Crossing Alerts Support
Congestion Control Support
Redundancy Support
19
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Feature Description
Here, Wi-Fi AAA acts as the RADIUS accounting client and R-eWAG as the RADIUS accounting server. R-eWAG
extracts the necessary attributes required to create the GTP tunnel to GGSN. R-eWAG resolves the APN to get the
GGSN address to which to create the GTP tunnel. In this release, the PDP context will be created with a dynamic IP
address. On successful creation of the GTP tunnel, R-eWAG creates the association between the GGSN-assigned IP
address and the Wi-Fi IP address.
All IP data packets generated by the UE in the WLAN are directed to the R-eWAG. The R-eWAG NATs the outer
source IP address (Wi-Fi IP address) with the GGSN-assigned IP address (MPC IP address) and forwards it to the
GGSN via the GTP tunnel. The application servers in the PDN identify the UE by the GGSN-assigned IP address.
In the downlink direction, the R-eWAG NATs the outer destination address (MPC IP address) to the Wi-Fi IP address
so that it is correctly routed to the UE in the WLAN.
Important: In this release, R-eWAG does not support Tunneling (IP over GRE).
ICMP Processing: ICMP packets in the downlink direction are remapped and sent to the UE.
eWAG – GGSN (Gn’):
PDP Activation Messages: The following messages are supported over the Gn’ reference point:
Create PDP Context Request / Response
Update PDP Context Request / Response: R-eWAG-initiated Update PDP Context scenario is
supported as explained in the Session Update Call Flow section.
Delete PDP Context Request / Response
Error Indication
Version Not Supported
GTP Payload Forwarding
GTP Echo
20
RADIUS-based Enhanced Wireless Access Gateway Overview
Feature Description ▀
IP Address Allocation
When a UE attaches to the WLAN network it obtains an IP address from the WLAN network (Wi-Fi IP address). Also,
when the R-eWAG creates PDP context with the GGSN, the GGSN assigns a remote MPC IP address to the UE. In the
Create PDP Context Request message the end-subscriber-address IE will be empty (indicating dynamic address
assignment by the GGSN), which makes the GGSN assign and return an IP address in the response message.
eWAG performs NAT between the Wi-Fi IP address and the MPC IP address during data transmission.
Important: In this release, the R-eWAG always assigns the NSAPI value 15. For simultaneous GPRS and
WLAN connection with the same GGSN, if the UE uses NSAPI 15 for GPRS PDP context then context replacement
will occur at the GGSN.
21
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Feature Description
For the downlink path, DSCP markings can be configured to control the DSCP markings for downlink packets. IP
header of the packet is updated with the value in TOS field. Note that there is no tunnel at access side in R-eWAG,
hence TOS field in subscriber IP packet is marked with DSCP value directly.
For uplink traffic—traffic from R-eWAG to GGSN through GTP tunnel—DSCP markings can be configured. In this
case, only outer IP header is used to routing the packet over Gn’ interface. Hence, TOS field of only outer IP header is
changed, that is subscriber packet is not marked with DSCP value at R-eWAG.
DSCP marking can be configured with a “pass through” option, which when configured uses the marking received on
the ingress to mark packets on egress.
Important: Note that in all cases only the NI part (as in the APN definition) needs to be specified as APN name
in R-eWAG.
22
RADIUS-based Enhanced Wireless Access Gateway Overview
Feature Description ▀
GGSN Selection
In this release, R-eWAG assumes the presence of Operator Identifier (OI) in “mncXXX.mccYYY.gprs” format in APN
received in the “Called-Station-ID” AVP. However, no validation of the presence of OI is made. The “Called-Station-
Id” AVP content is sent to DNS for GGSN IP address resolution without any modification. The same is applicable if the
“Called-Station-Id” AVP is not present and the default APN configuration in the R-eWAG service is used. Note that in
both these cases only the Network Identifier (NI) part has to be configured as APN at R-eWAG.
23
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Feature Description
On successful creation of the GTP tunnel, the R-eWAG creates the association between the GGSN-assigned IP address
and the Wi-Fi IP address with static NAT support. The binding between the Wi-Fi IP address and GGSN IP address for
a subscriber is maintained by R-eWAG/NAT.
In the uplink direction, the R-eWAG accepts Layer 3 Wi-Fi packets, which are translated by NAT. The Source IP
address, which is the Wi-Fi IP address, is translated to the GGSN-assigned IP address. The translated packet is then
encapsulated into GTP tunnel and forwarded to the GGSN.
In the downlink direction, the R-eWAG de-capsulates the GTP packets and translates the destination IP address, which
is the GGSN IP address, to the Wi-Fi IP address and then forwards the packets to the Wi-Fi network.
The R-eWAG + NAT/ALG supports the ability to apply the FTP, SIP, RTSP, PPTP, and H323 ALG on the subscriber's
IP flows.
Important: eWAG call requires NAT configuration. Without NAT, R-eWAG call will not setup. For NAT/ALG,
R-eWAG service configuration requires rulebase configuration with NAT ALG enabled, IN and OUT ACL in APN, and
Firewall-and-NAT policy specified in the APN or rulebase. For R-eWAG + GGSN combo deployments, virtual-APN
configuration is required to separate the rulebases required for R-eWAG (for NAT) and GGSN (for DPI, NAT, P2P, and
others).
Important: For R-eWAG + GGSN combo deployments, the virtual-APN configuration is required to ensure that
the rulebases required for R-eWAG (for NAT) and GGSN (for DPI, NAT, P2P, and others) work without any issues.
For more information on virtual-APN support in R-eWAG + GGSN combo deployments refer to the Dependencies and
Limitations section.
24
RADIUS-based Enhanced Wireless Access Gateway Overview
Feature Description ▀
25
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Feature Description
address in the “Calling-Station-Id” AVP’s format as per RFC 3580, that is the MAC address in ASCII format (upper
case only), with octet values separated by hyphens. For example, “00-10-A4-23-19-C0”.
Important: Note that R-eWAG's encoding of the UE MAC address into IMEIsV is not standards based. This is
because the IMEIsV definition only allows values in the range of 0–9. While the MAC address hex values range from
0–F. TBCD encoding used for encoding IMEIsV on GTP allows the range 0–F. Also, when the UE MAC address is
encoded into IMEIsV in TBCD format, MAC address is encoded in the initial six bytes of IMEIsV IE. The last two
bytes get padded with FFFE in TBCD encoding. The last nibble is encoded as 0xE since if the ASR5000 GGSN
encounters F in the last nibble it drops the last byte considering it a filler. As all the 16 ASCII -hex characters have to be
sent to Gx, Gy, and CDR interfaces, the R-eWAG instead encodes the last two bytes as FFFE.
The SN-WLAN-UE-Identifier UE MAC to IMEIsV encoding is CLI controlled. Only if the map ue-mac-to-imei
CLI command is enabled in the R-eWAG service, mapping will take place and IMEIsV will be sent to the GGSN.
Important: Note that the “SN-WLAN-UE-Identifier” AVP is available only in the “starent” RADIUS dictionary.
Therefore, UE Identity Information support is available only if R-eWAG uses the “starent” RADIUS dictionary, if not
R-eWAG will ignore the AVP.
Important: Note that the “SN-WLAN-AP-Identifier” AVP is available only in the “starent” RADIUS dictionary.
Therefore, UE Location Information support is available only if R-eWAG uses the “starent” RADIUS dictionary, if not
R-eWAG will ignore the AVP.
26
RADIUS-based Enhanced Wireless Access Gateway Overview
Feature Description ▀
The system can be configured to collect bulk statistics (performance data) and send them to a collection server (called a
receiver). Bulk statistics are statistics that are collected in a group. The individual statistics are grouped by schema.
For the list of supported schema and information on how to configure them, refer to the Enhanced Wireless Access
Gateway Configuration chapter.
The system supports the configuration of up to four sets (primary/secondary) of receivers. Each set can be configured
with to collect specific sets of statistics from the various schema. Statistics can be pulled manually from the system or
sent at configured intervals. The bulk statistics are stored on the receiver(s) in files.
The format of the bulk statistic data files can are configurable, operators can specify the format of the file name, file
headers, and/or footers to include information such as the date, system host name, system uptime, the IP address of the
system generating the statistics (available for only for headers and footers), and/or the time that the file was generated.
When the Web Element Manager is used as the receiver, it is capable of further processing the statistics data through
XML parsing, archiving, and graphing.
The Bulk Statistics Server component of the Web Element Manager parses collected statistics and stores the information
in the PostgreSQL database. If XML file generation and transfer is required, this element generates the XML output and
can send it to a Northbound NMS or an alternate bulk statistics server for further processing.
Additionally, if archiving of the collected statistics is desired, the Bulk Statistics server writes the files to an alternative
directory on the server. A specific directory can be configured by the administrative subscriber or the default directory
can be used. Regardless, the directory can be on a local file system or on an NFS-mounted file system on the Web
Element Manager server.
Important: For more information on bulk statistic configuration, refer to the Configuring and Maintaining Bulk
Statistics chapter in the System Administration Guide.
27
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Feature Description
Generation of specific traps can be enabled or disabled on the chassis. Ensuring that only important faults get
displayed. SNMP traps are supported in both Alert and Alarm modes.
Logs: The system provides a facility called threshold for which active and event logs can be generated. As with
other system facilities, logs are generated. Log messages pertaining to the condition of a monitored value are
generated with a severity level of WARNING.
Logs are supported in both the Alert and the Alarm models.
Alarm System: High threshold alarms generated within the specified polling interval are considered
“outstanding” until a the condition no longer exists or a condition clear alarm is generated. “Outstanding”
alarms are reported to the system's alarm subsystem and are viewable through the Alarm Management menu in
the Web Element Manager.
The Alarm System is used only in conjunction with the Alarm model.
Important: For more information on thresholds, refer to the Thresholding Configuration Guide.
Congestion Control monitors the system for conditions that could potentially degrade performance when the system is
under heavy load. Typically, these conditions are temporary (for example, high CPU or memory utilization) and are
quickly resolved. However, continuous or large numbers of these conditions within a specific time interval may have an
impact the system’s ability to service subscriber sessions. Congestion control helps identify such conditions and invokes
policies for addressing the situation.
Congestion control operation is based on configuring the following:
Congestion Condition Thresholds: Thresholds dictate the conditions for which congestion control is enabled
and establishes limits for defining the state of the system (congested or clear). These thresholds function in a
way similar to operation thresholds that are configured for the system as described in the Thresholding
Configuration Guide. The primary difference is that when congestion thresholds are reached, a service
congestion policy and an SNMP trap are generated.
A threshold tolerance dictates the percentage under the configured threshold that must be reached in order for
the condition to be cleared. An SNMP trap is then triggered.
Port Utilization Thresholds: Congestion thresholds for utilization of all ports in the system.
Port-specific Thresholds: Congestion thresholds for individual ports.
Service Congestion Policies: Congestion policies are configurable for each service. These policies
dictate how services respond when the system detects that a congestion condition threshold has been
crossed.
License Utilization: Congestion thresholds for license utilization on the system.
Maximum Sessions-per-Service Utilization: Congestion thresholds for maximum number of sessions
allowed per service.
28
RADIUS-based Enhanced Wireless Access Gateway Overview
Feature Description ▀
Important: For more information on Congestion Control feature, refer to the Congestion Control chapter in the
System Administration Guide.
Redundancy Support
Important: In this release, R-eWAG supports basic Session Recovery, ICSR is not supported.
Session Recovery feature provides a mechanism to recover failed Session Manager (SessMgr) task(s) without any call
loss. Recovery framework is same as used by other products. A minimum of four PSCs (three active and one standby) is
required in an ASR 5000 chassis to support the Session Recovery feature. This is because the DEMUX Manager and
VPN Manager tasks run on a PSC where no SessMgr runs when session recovery is enabled and one PSC is used as
standby PSC. The other two PSCs run SessMgr and AAAMgr tasks.
Session Recovery is a licensed feature and can be controlled from the CLI, that is enabled/disabled Session Recovery
across the whole chassis. When the CLI is used to configure the Session Recovery feature, Session Controller updates
each SessMgr task.
In the case of R-eWAG, the IPSG Manager, SGTPC Manager, and VPN Manager run on one PSC. SessMgr runs on one
separate PSC. AAAMgr runs on one separate PSC and on one standby PSC. Therefore, a minimum of four PSCs (three
active and one standby) are required.
For R-eWAG Session Recovery support, existing IPSG Session Recovery framework is reused for recovering access
side attributes common between IPSG and R-eWAG sessions. New fields are added in IPSG Session Recovery record to
recover attributes specific to R-eWAG session such as WLAN IP address, MPC IP address, R-eWAG GTP information,
and so on. R-eWAG GTP context information will be recovered similar to TTG since Gn' interface is used by both.
29
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ How it Works
How it Works
This section presents call procedure flows for the following scenarios:
Session Setup
Session Setup using Accounting-Interim
Session Replacement
Session Setup Failure
Mandatory AVP Missing No Resource
GTP Tunnel Setup Failure
Session Update
WLC-initiated Accounting Interim
GGSN-initiated Update PDP Context
Session Teardown
UE Detach - Accounting Stop
GGSN-initiated DPC
eWAG TimeoutsAdmin Disconnect
Session Setup
This section presents call flow for the session setup scenario.
30
RADIUS-based Enhanced Wireless Access Gateway Overview
How it Works ▀
31
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ How it Works
Step Description
1 The UE attaches to the WLAN network using WLAN attach procedure by selecting SSID advertised for 3G access.
2 The UE provides its EAP-identity for authentication in 802.1x message.
3 The WLC forwards the UE EAP-identity to the Wi-Fi AAA server in RADIUS Access-Request message by encapsulating
the EAP message in it. This message also contains the WLAN UE’s MAC Address and the WLAN Radio Network
Identifier.
4 The Wi-Fi AAA server proxies the Access-Request message to the 3GPP AAA server.
5 The 3GPP AAA server identifies the subscriber as a candidate for authentication with EAP-SIM/AKA based on the
received identity. It interacts with the HLR to fetch the GSM/UMTS authentication vectors for EAP-SIM/AKA
authentication and other 3GPP-specific attributes like IMSI, MSISDN, APN, and Charging Characteristics from the
subscriber’s profile.
6 The 3GPP AAA server sends Access-Challenge-Request to the UE as part of EAP-SIM/AKA authentication procedure to
the Wi-Fi AAA Proxy server.
7 The Wi-Fi AAA proxies the Access-Challenge message back to the WLC.
8 The WLC sends the EAP-Challenge message to the UE over 802.1x.
9 Similar EAP message exchanges happen between the UE and 3GPP AAA as part of the authentication procedure.
10 After successful authentication, the 3GPP AAA sends an Access-Accept message with 3GPP-specific attributes like IMSI,
MSISDN, Charging-Characteristics, APN, and others.
11 The Wi-Fi AAA server caches these 3GPP attributes in Access-Accept message, which will be later used to enrich the
RADIUS accounting messages generated from WLC and sent to the R-eWAG.
12 The Wi-Fi AAA proxies the Access-Accept message to the WLC.
13 The WLC sends the EAP-Success message over 802.1x to the UE and completes the authentication procedure.
14 The UE gets an IP address allocated from the Wi-Fi domain using the DHCP exchanges as per the normal WLAN
procedure of allocating IP address.
Note that the DHCP server allocating this IP address to the UE is part of the Wi-Fi domain, and the IP address thus
allocated is hereon referred to as the Wi-Fi IP address.
15 After the IP address is allocated to the attaching UE, the WLC initiates RADIUS accounting for the UE session by sending
a RADIUS Accounting-Start message to the Wi-Fi AAA.
16 The Wi-Fi AAA sends the Accounting-Response message back to the WLC as acknowledgement.
17 The Wi-Fi AAA server enriches the Accounting-Start message received with 3GPP-specific attributes as mentioned in Step
11. This modification of Accounting-Start message later helps the R-eWAG in creating the PDP context with the GGSN,
which requires 3G attributes like IMSI, MSISDN, APN, and others.
18 The Wi-Fi AAA server sends the Accounting-Start message enriched with the 3GPP-specific attributes to the R-eWAG.
19 The R-eWAG creates a new session based on this Accounting-Start message. It assumes the default APN configured under
R-eWAG service if it is not available in the Accounting-Start message. It also assigns a default QoS value for the R-eWAG
session if not available in the Accounting-Start message.
20 The R-eWAG identifies the GGSN it needs to connect with using the same 3G procedure of identifying GGSN from
SGSN(/TTG) using DNS resolution. The R-eWAG then sends the Create PDP Context Request message to the GGSN to
create the GTP tunnel.
32
RADIUS-based Enhanced Wireless Access Gateway Overview
How it Works ▀
Step Description
21 The GGSN processes the Create PDP Context Request and allocates the MPC IP address in the Create PDP Context
Response message. It also negotiates the QoS to be used for this subscriber session and sends the same in Create PDP
Context Response message.
22 The R-eWAG processes the Create PDP Context Response message, and creates the binding between the Wi-Fi IP address
and the MPC IP address in the R-eWAG session.
23 The R-eWAG sends an Accounting-Response message to the Wi-Fi AAA server to acknowledge the Accounting-Start
message.
24 The UE initiates data transfer to the destination in APN network with Source IP set to its Wi-Fi IP address. This packet gets
routed to the R-eWAG from the WLAN network.
25 The R-eWAG performs NAT on this data packet (Layer 3 to Layer 7), from Wi-Fi IP address to MPC IP address.
26 The R-eWAG sends the NATd IP packet encapsulated over the GTP-U tunnel created with the GGSN.
27 The GGSN decapsulates the IP packet received over the GTP-U tunnel and sends it to the destination APN network. Note
that this IP packet contains the source IP address set to the MPC IP address.
28 The data packet received in the downlink direction from the APN network is processed by the GGSN. This downlink
packet contains the destination IP address set to the MPC IP address.
29 The GGSN encapsulates the IP packet over the GTP-U tunnel and sends it downlink to the R-eWAG.
30 The R-eWAG performs reverse-NAT on the downlink IP packet (received over the GTP-U tunnel from the GGSN) and
converts all MPC IP addresses to Wi-Fi IP addresses from Layer 3 to Layer 7.
31 The R-eWAG sends the plain IP packet downlink to the UE.
33
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ How it Works
34
RADIUS-based Enhanced Wireless Access Gateway Overview
How it Works ▀
Step Description
1 The UE attaches to the WLAN network using WLAN technology attach procedure by selecting SSID advertised for 3G
access.
2 The UE provides its EAP-identity for authentication in 802.1x message.
3 The WLC forwards the UE EAP-identity to the Wi-Fi AAA server through RADIUS Access-Request message by
encapsulating the EAP message in it. This message also contains the WLAN UE MAC Address and the WLAN Radio
Network Identifier.
4 The Wi-Fi AAA server proxies the Access-Request message to the 3GPP AAA server.
5 The 3GPP AAA server identifies the subscriber as a candidate for authentication with EAP-SIM/AKA based on received
identity. It interacts with the HLR to fetch the GSM/UMTS authentication vectors for EAP-SIM/AKA authentication and
other 3GPP-specific attributes from the subscriber profile, including IMSI, MSISDN, APN, and Charging Characteristics.
6 The 3GPP AAA sends the Access-Challenge-Request to the UE as part of EAP-SIM/AKA authentication procedure to the
Wi-Fi AAA proxy server.
7 The Wi-Fi AAA proxies the Access-Challenge message back to the WLC.
8 The WLC sends the EAP-Challenge message to the UE over 802.1x.
9 Similar EAP message exchanges happen between the UE and 3GPP AAA as part of authentication procedure.
10 After successful authentication, the 3GPP AAA sends an Access-Accept message with 3GPP-specific attributes including
IMSI, MSISDN, Charging-Characterstics, APN, etc.
11 The Wi-Fi AAA server caches the 3GPP attributes in the Access-Accept message, which will be later used to enrich the
RADIUS accounting messages generated from WLC and sent to the R-eWAG.
12 The Wi-Fi AAA proxies the Access-Accept message to the WLC.
13 The WLC sends the EAP-Success message over 802.1x to the UE and completes the authentication procedure.
14 The UE gets an IP address allocated from the Wi-Fi domain using DHCP exchanges as per the normal WLAN procedure of
allocating the IP address.
Note that the DHCP server allocating this IP address to the UE is part of Wi-Fi domain and the IP address thus allocated is
hereon referred to as the Wi-Fi IP address.
15 After the IP address is allocated to the attaching UE, the WLC initiates RADIUS accounting for the UE session by sending
RADIUS Accounting-Start message to the Wi-Fi AAA.
16 The Wi-Fi AAA server sends back the Accounting-Response to the WLC as acknowledgement.
17 The Wi-Fi AAA server sends the Accounting-Interim message enriched with 3GPP-specific attributes to the R-eWAG.
And, the R-eWAG creates the session based on this message and establishes GTP tunnel with the GGSN.
18 The R-eWAG creates new session based on this Accounting-Interim message. It assumes the default APN configured in the
R-eWAG service if it is not available in the Accounting-Interim message. It also assigns a default QoS value for the R-
eWAG session if not available in the Accounting-Interim message.
19 The R-eWAG identifies the GGSN to connect to using the same 3G procedure of identifying GGSN from SGSN/TTG
using DNS resolution. The R-eWAG then sends the Create PDP Context Request message to the GGSN to create the GTP
tunnel.
35
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ How it Works
Step Description
20 The GGSN processes the Create PDP Context Request and allocates the MPC IP address in the Create PDP Context
Response message. It also negotiates the QoS to be used for the subscriber session and sends the same in the Create PDP
Context Response message.
21 The R-eWAG processes the Create PDP Context Response message and creates the binding between the Wi-Fi IP address
and the MPC IP address in the R-eWAG session.
22 The R-eWAG sends the Accounting-Response message to the Wi-Fi AAA server to acknowledge the Accounting-Interim
message.
23 The UE initiates data transfer to the destination in APN network with Source IP set to its Wi-Fi IP address. This packet gets
routed to the R-eWAG from the WLAN network.
24 The R-eWAG performs NAT on this data packet (Layer 3 to Layer 7), from Wi-Fi IP address to MPC-IP address.
25 The R-eWAG sends the NATd IP packet encapsulated over the GTP-U tunnel created with the GGSN.
26 The GGSN decapsulates the IP packet received over the GTP-U tunnel, and sends it to the destination APN network. Note
that this IP packet contains the source IP address set to the MPC IP address.
27 The data packet received in the downlink direction from the APN network is processed by the GGSN. This downlink
packet contains the destination IP address set to the MPC IP address.
28 The GGSN encapsulates the IP packet over the GTP-U tunnel and sends it downlink to the R-eWAG.
29 The R-eWAG performs reverse-NAT on the downlink IP packet received over the GTP-U tunnel from the GGSN, and
converts all MPC IP addresses to Wi-Fi IP addresses from Layer 3 to Layer 7.
30 The R-eWAG sends the plain IP packet downlink to the UE.
Session Replacement
Session identification at R-eWAG is done using the following parameters:
Username+MSISDN combination
Wi-Fi IP address
If the R-eWAG cannot identify the session for the received Accounting-Start message using the above parameters, then
session replacement will happen if any one of the above parameters matches existing session as explained below:
1. Matching session found at R-eWAG with same Username+MSISDN combo but containing different Wi-Fi IP
address. This is the scenario where the subscriber lost connectivity with Wi-Fi and is trying to reconnect again
with a different IP address.
2. Matching session found at R-eWAG with same Wi-Fi IP address but containing different Username+MSISDN
combo. This is the scenario where the subscriber has disconnected from Wi-Fi network and released the IP
address but the Accounting-Stop sent from WLC is lost/not received by R-eWAG. So the session at R-eWAG
will be stale during this time and when new Accounting-Start message comes with the same Wi-Fi IP address
as the existing session it will get replaced as this Accounting-Start message is for new subscriber with different
Username+MSISDN combo.
Important: In case of session replacement, old call will be disconnected with the session
disconnect reason “IPSG-session-replacement”.
36
RADIUS-based Enhanced Wireless Access Gateway Overview
How it Works ▀
If R-eWAG finds a matching session using the session identification parameters then the older session is
replaced with the newer session on receipt of the Accounting-Start message under the following conditions:
• Matching session found at R-eWAG with same Username+MSISDN and Wi-Fi IP address received in
the new Accounting-Start message but containing different APN. This is the scenario where the same
subscriber is trying to connect through different APN.
• Matching session found at R-eWAG with same Username+MSISDN and Wi-Fi IP address received in
the new Accounting-Start message but containing different Accounting-Session-ID. This is the
scenario where the same subscriber is trying to connect again after loosing the previous session for
some reason (for example, got detached from the WLAN, UE restart, and so on).
• Matching session found at R-eWAG with same Username+MSISDN and Wi-Fi IP address received in
the new Accounting-Start message but containing different NAS-IP-Address. This is the scenario
where the same subscriber is trying to connect again due to loosing the previous session for some
reason (for example, got detached from the WLAN, UE restart, and so on) and when the subscriber is
trying to re-connect it is coming through different WLC/ISG.
• Matching session found at R-eWAG with same Username+MSISDN and Wi-Fi IP address received in
the new Accounting-Start message but containing different Source IP address. This is the scenario
where the same subscriber is trying to re-connect due to loosing the previous session for some reason
(for example, getting detached from the WLAN, UE restart, and so on) and when the subscriber tries
to re-connect it is coming through different Wi-Fi AAA.
• Matching session found at R-eWAG with same Username+MSISDN and Wi-Fi IP address received in
the new Accounting-Start message but containing different IMSI. This negative scenario should not
occur as MSISDN and IMSI will have one-to-one mapping. However, the session will be replaced if
this scenario does happen and IMSI is handled in similar way as all the other parameters explained
earlier.
Important: In this release, R-eWAG does not support overlapping IP addresses. The IP addresses for all UEs
spread across all WLANs are expected to be unique.
Note that at any time, only one APN is supported for a subscriber. This is because APN selection is tied with WLAN
attach. UE can be connected to only one WLAN (SSID) at a time. So, during session establishment with R-eWAG only
one APN can be supplied in Accounting-Start. If a new request comes with same Username+MSISDN but a different
APN, it would mean that the UE lost connection with the WLAN and then re-attached.
Also, note that the IMSI and MSISDN should have one-to-one relationship. So, R-eWAG uses only MSISDN for
session-identification. In case where different IMSI arrives for same MSISDN call, the older call gets replaced as
explained above.
37
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ How it Works
38
RADIUS-based Enhanced Wireless Access Gateway Overview
How it Works ▀
Session Update
This section presents call flows for the following session update scenarios:
WLC-initiated Accounting Interim
39
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ How it Works
Important: Note that R-eWAG internally uses R7-QoS regardless of which QoS is requested and negotiated.
When R-eWAG receives UPC from GGSN, it compares it with the QoS requested by AAA and QoS with smaller
version is selected for UPC response. In case of same version, QoS with small Max-bit-rate (MBR) is selected.
40
RADIUS-based Enhanced Wireless Access Gateway Overview
How it Works ▀
Important: The R-eWAG does not generate any CoA RADIUS Request to Wi-Fi AAA as the R-eWAG acts as a
RADIUS accounting server towards Wi-Fi AAA and not as an authorization server.
Session Teardown
This section presents call flows for the following session teardown scenarios:
UE Detach - Accounting Stop
GGSN-initiated DPC
eWAG TimeoutsAdmin Disconnect
41
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ How it Works
GGSN-initiated DPC
This section presents call flow for the Session Teardown – GGSN-initiated scenario.
42
RADIUS-based Enhanced Wireless Access Gateway Overview
How it Works ▀
43
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Dependencies and Limitations
44
RADIUS-based Enhanced Wireless Access Gateway Overview
Dependencies and Limitations ▀
different set of APN configurations. R-eWAG will use the virtual-APN and GGSN will be using the real-APN
configuration in this case.
Note that in the ASR 5000 chassis the virtual-APN selection can be based on other criteria apart from access gateway
(AGW) address selection like MSISDN range, RAT type, and so on. R-eWAG uses only AGW address criteria, which
is the RADIUS accounting-client from which the initial Accounting-Start message is received.
This way, the real-APN can be configured with virtual-APN selection based on RADIUS-client for R-eWAG, clearly
separating out the APN configuration being used by colocated R-eWAG+GGSN. So, after enabling virtual-APN for R-
eWAG in colocated chassis as explained above, the configurations under virtual-APN are used only by R-eWAG
callline and the configurations under real-APN will be used only by the GGSN callline without affecting each other.
Important: Note that if the virtual-APN profile configuration is not available for the virtual-APN name specified
under the real-APN, the call will get dropped with unknown-APN as the reason.
Consider the R-eWAG+GGSN combo deployment with an SGSN connecting to the GGSN for 3G access. In this case,
if the SGSN service's IP address subnet is 111.2.3.4/24 and the RADIUS accounting-client that is sending Accounting-
Start message to the R-eWAG is also in the same subnet 111.2.3.4/24, the virtual-APN is configured under real-APN as
follows:
virtual-apn preference 1 apn ewag_corp1 access-gw-addr 111.2.3.4/24
In the above case, when the call is coming through 3G macro-access and landing in GGSN, the virtual-APN criteria
matches for the GGSN call line as the AGW address in this case is SGSN node, which matches the subnet. So, the
GGSN call line will start using virtual-APN profile. In the same way, when the call is coming through Wi-Fi access
through R-eWAG, then the virtual-APN criteria matches for the R-eWAG callline as the AGW address in this case is
RADIUS accounting-client which matches the subnet. So the R-eWAG call line will start using virtual-APN profile as
well. Also, if the R-eWAG service's IP address subnet matches with the RADIUS accounting-client IP address and there
is a virtual-APN configuration based on this subnet range as AGW address, then both R-eWAG and GGSN call lines
start using the virtual-APN profiles only ignoring real-APN. This is because AGW address for R-eWAG call is
RADIUS accounting-client and the AGW address for GGSN call is R-eWAG (GTP-peer) and both of them are in the
same subnet making the virtual-APN condition to be true for both call lines. It is important to be aware of above
possibilities to avoid any mis-configurations or undetermined behavior.
Important: In this release, the R-eWAG + TTG combo deployment option is not fully qualified and is not
supported, it is available only for lab / testing purposes.
This section lists dependencies and limitations for R-eWAG + TTG combo deployments.
45
RADIUS-based Enhanced Wireless Access Gateway Overview
▀ Dependencies and Limitations
is not received then SGTP will not start with GTPv0. The call will be rejected with disconnect reason “act-
rejected-by-ggsn”. The same is true if the TTG call is setup first and then the R-eWAG call comes up.
If the R-eWAG call is setup with GTPv0 and new TTG call with same IMSI and NSAPI 15 comes up on the
same SessMgr, the TTG call will be dropped with the cause “no resource”. The same is true if the TTG call is
setup first and then the R-eWAG call comes up.
If the R-eWAG call and the TTG call with the same IMSI and same NSAPI land on different SessMgr call setup
is not affected.
Important: In this release, the R-eWAG + TTG + GGSN combo deployment option is not fully qualified and is
not supported, it is available only for lab / testing purposes.
This section lists dependencies and limitations for R-eWAG + TTG + GGSN combo deployments.
The R-eWAG + TTG + GGSN combo setup works on a single chassis. For considerations, refer to the eWAG + GGSN
Combo Deployments and eWAG + TTG Combo Deployments sections.
Important: In this release, R-eWAG Mobility Support is not fully qualified and is not supported, it is available
only for lab / testing purposes.
46
Chapter 3
RADIUS-based Enhanced Wireless Access Gateway
Configuration
This chapter provides information on configuring the RADIUS-based Enhanced Wireless Access Gateway (R-eWAG)
service.
The following topics are covered in this chapter:
Before You Begin
R-eWAG Configuration
R-eWAG Administration
47
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ Before You Begin
48
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Configuration ▀
R-eWAG Configuration
This section describes how to configure the R-eWAG service.
1. Create and configure the R-eWAG service as described in the Creating and Configuring the R-eWAG Service
section.
Important: Note that the R-eWAG service is the IPSG service configured in R-eWAG mode.
There is no separate R-eWAG configuration mode.
2. Create and configure an APN for R-eWAG as described in the Configuring the APN section.
3. Create and configure an SGTP service for R-eWAG as described in the Configuring the SGTP Service section.
4. Configure the NAT in-line service for R-eWAG as described in the Configuring NATALG Support section.
5. Save your configuration to the flash memory, an external memory device, and/or a network location using the
Exec Mode command save configuration. For additional information on how to verify and save
configuration files, refer to the System Administration Guide and the Command Line Interface Reference.
Important: Commands used in the configuration examples in this section provide base functionality to the extent
that the most common or likely commands and/or keyword options are presented. In many cases, other optional
commands and/or keyword options are available. Refer to the Command Line Interface Reference for complete
information regarding all commands.
configure
end
Notes:
The ewag keyword enables the R-eWAG service (IPSG service in R-eWAG mode), and enters the IPSG
RADIUS Server Configuration Mode, which is common for the R-eWAG and IPSG services.
49
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Configuration
You can configure a maximum of 64 eWAG/IPSG services in the system, one per context. Only one IPSG
service must be configured per context. Multiple eWAG services must not be configured in the same context as
they will not be able to differentiate between uplink and downlink packets.
configure
context <context_name>
#To bind the R-eWAG service to a logical AAA interface and configure the number of
subscriber sessions allowed:
#To enable APN profile for R-eWAG and optionally configure the default APN:
50
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Configuration ▀
#To enable mapping of UE MAC address to IMEIsV IE of GTP message in order to send it to
the GGSN:
map ue-mac-to-imei
setup-timeout <setup_timeout>
end
Notes:
In the APN profile configuration, <default_apn_name> specifies the default APN to be used for the R-eWAG
service. It should be configured as NI+OI for proper DNS resolution. Also, note that R-eWAG does not
support subscriber profile.
<dictionary_name> specifies the RADIUS dictionary to use for the R-eWAG service. For information on
which dictionary to use in your deployment, contact your Cisco account representative. The default dictionary
is starent-vsa1.
In the RADIUS accounting parameter configurations, the disconnect-message option enables sending
RADIUS accounting messages to the configured RADIUS accounting client if the call goes down due to any
failure. If this option is not configured, the R-eWAG will not send Disconnect-Message in call failure
scenarios.
In the binding configuration, the source-context option specifies the source context where RADIUS
accounting requests are received. This keyword should be configured if the source of the RADIUS requests is
in a different context than the R-eWAG service. If not configured, the system will default to the context in
which the R-eWAG service is configured.
The map ue-mac-to-imei CLI command supports enabling/disabling UE MAC to IMEI mapping. When
enabled, the UE MAC received in “Calling-Station-Id” RADIUS attribute is mapped to IMEIsV and sent in
GTP CPC message towards the GGSN.
configure
context <context_name>
#To bind the R-eWAG service to a logical AAA interface and configure the number of
subscriber sessions allowed:
51
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Configuration
#To enable APN profile for R-eWAG and optionally configure the default APN:
#To enable mapping of UE MAC address to IMEIsV IE of GTP message in order to send it to
the GGSN:
map ue-mac-to-imei
setup-timeout <setup_timeout>
end
Notes:
In the APN profile configuration, <default_apn_name> specifies the default APN to be used for the R-eWAG
service. It should be configured as NI+OI for proper DNS resolution. Also, note that R-eWAG does not
support subscriber profile.
<dictionary_name> specifies the RADIUS dictionary to use for the R-eWAG service. For information on
which dictionary to use in your deployment, contact your Cisco account representative. The default dictionary
is starent-vsa1.
In the RADIUS accounting parameter configurations, the disconnect-message option enables the sending of
RADIUS accounting messages to the configured RADIUS accounting client when call goes down due to any
failure. Note that without this enabled, R-eWAG will not send Disconnect-Message in call failure scenarios.
In the binding configuration, the source-context option specifies the source context where RADIUS
accounting requests are received. This keyword should be configured if the source of the RADIUS requests is
in a different context than the R-eWAG service. If not configured, the system will default to the context in
which the R-eWAG service is configured.
52
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Configuration ▀
The map ue-mac-to-imei CLI command supports enabling/disabling UE MAC to IMEI mapping. When
enabled, the UE MAC received in “Calling-Station-Id” RADIUS attribute is mapped to IMEIsV and sent in
GTP CPC message towards the GGSN.
R-eWAG has the ability to locally select a GGSN. This would be used in case a DNS server is unavailable or
unreachable at the moment. For this purpose, use the gtp peer-ip-address <ipv4_address> CLI
command.
configure
context <context_name>
apn <apn_name>
accounting-mode none
ip access-group <access_list_name> in
end
Notes:
In the ASR 5000 chassis, virtual APN selection can be based on other criteria apart from Access Gateway
address (access-gw-address) selection, such as the MSISDN range, RAT type, and so on. However, only
the access gateway address criteria is applicable to the R-eWAG, which is the RADIUS accounting client from
which the initial Accounting-Start message is received.
Note that for stand-alone R-eWAG deployments virtual APN is not mandatory.
53
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Configuration
For more information on virtual APN in R-eWAG + GGSN combo deployments, refer to the Enhanced Wireless
Access Gateway Overview chapter.
In the IP access group configuration, the access list ( <access_list_name>) specified must be configured in
the destination context with ECS redirect ACL. See the Access List Configuration section.
For R-eWAG, the Firewall-and-NAT policy for subscribers can be specified either in the APN template or in the
ECS rulebase. For selection, the policy specified in the APN configuration has higher priority than the one
specified in the ECS rulebase configuration.
configure
context <context_name>
sgtp-service <sgtp_service_name>
#To configure the restart counter change window to avoid service deactivations and
activations that could cause large bursts of network traffic if the restart counter
change messages from the GGSN are erroneous:
max-remote-restart-counter-change <variance>
end
Notes:
The SGTP service must be associated in the R-eWAG service configuration.
54
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Configuration ▀
configure
rulebase <rulebase_name>
end
configure
context <context_name>
apn <apn_name>
end
configure
#FTP ALG:
55
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Configuration
ruledef <ftp_control_ruledef_name>
rule-application routing
exit
ruledef <ftp_data_ruledef_name>
rule-application routing
exit
#SIP ALG:
ruledef <sip_ruledef_name>
rule-application routing
exit
#RTSP ALG:
ruledef <rtsp_ruledef_name>
rule-application routing
exit
#PPTP ALG:
ruledef <pptp_ruledef_name>
rule-application routing
exit
#TFTP ALG:
ruledef <tftp_ruledef_name>
rule-application routing
exit
#H323 ALG:
56
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Configuration ▀
ruledef <h323_ruledef_name>
rule-application routing
exit
ruledef <h323_multi_ruledef_name>
rule-application routing
exit
ruledef <h323_tcp_ruledef_name>
rule-application routing
exit
rulebase <rulebase_name>
exit
57
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Configuration
end
Notes:
For more information on ECS ruledef and rulebase configurations, refer to the Enhanced Charging Service
Administration Guide.
Additional Configurations
This section covers the following configurations:
Configuring Access Lists
Configuring Bulk Statistics
Configuring Congestion Control
Configuring Offline Charging for R-eWAG
Configuring Session Recovery
configure
context <context_name>
ip access-list <access_list_name>
end
Notes:
<ecs_service_name> must be the name of the enhanced charging service; no CSS service has to be
configured.
configure
bulkstats mode
end
58
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Configuration ▀
Notes:
For detailed information on R-eWAG-related bulk statistics available in the IPSG schema, refer to the IPSG
Schema chapter of the Statistics and Counters Reference, and for those available in the System schema, refer to
the System Schema chapter of the Statistics and Counters Reference.
Apart from the IPSG and System schema, as needed you can also configure variables available in the other
schema, including:
APN: For Access Point Name (APN) related statistics
Card: For card-level statistics
Context: For context service related statistics
ECS: For Enhanced Charging Service related statistics
Port: For port-level statistics
RADIUS: For per-RADIUS server statistics
The following is a sample schema format for R-eWAG statistics:
“eWAG Schema: Test\n ----------------------\nVPN Name:%vpnname%,\nService
Name:%servname%,\n Session Statistics: \n Total Current Sessions
:%total_current_sessions%,\n Total Sessions Setup: %total_sessions_setup%,\n -----
-----------------\n”
configure
congestion-control
end
Notes:
Congestion policies are configurable for each service. These policies dictate how the services respond when the
system detects that a congestion condition threshold has been crossed. For more information on the Congestion
Control feature, refer to the Congestion Control chapter of the System Administration Guide.
59
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Configuration
In the above configuration, the Congestion Control thresholds featured are at the system level and are not
specific to R-eWAG.
R-eWAG supports only critical threshold values.
The output of this command displays information including whether or not Congestion Control is enabled/disabled,
Congestion Control threshold parameter settings, Congestion Control policy, and more.
configure
gtpp single-source
context <context_name>
exit
60
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Configuration ▀
exit
accounting-context <ewag_accounting_context_name>
exit
apn <apn_name>
accounting-mode gtpp
end
Notes:
For information on the GTPP dictionary to use contact your Cisco account representative.
Optional APN-level configuration to override charging characteristics supplied in Acct-Start:
configure
context <context_name>
apn <apn_name>
end
configure
61
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Configuration
end
Notes:
For more information on the Session Recovery feature, refer to the Session Recovery chapter of the System
Administration Guide.
A valid feature key is required for this configuration. This command enables/disables the feature to try to
perform hitless session recovery for all session types supported by the software release. After enabling session
recovery through this configuration, make sure that session recovery status is “ready”.
62
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Administration ▀
R-eWAG Administration
This section describes R-eWAG administrative procedures.
This section includes the following topics:
Logging Support
Protocol Monitoring Support
Gathering R-eWAG-related Statistics and Information
Logging Support
To view IPSG-related logs, in the Exec Mode use the following command:
To view SGTP-related logs, in the Exec Mode use the following command:
To view SessMgr-related logs, in the Exec Mode use the following command.
SessMgr info level log having event ID 12077 displays the mapping between WLAN IP address and MPC IP address
along with subscriber information, including Username, IMSI, MSISDN, and APN.
Monitor Protocol
The system’s protocol monitor displays information for every session that is currently being processed. Depending on
the number of protocols monitored, and the number of sessions in progress, a significant amount of data is generated. It
is highly recommended that logging be enabled on your terminal client in order to capture all of the information that is
generated.
To view monitor protocol based logging information, in the Exec Mode use the following command:
63
RADIUS-based Enhanced Wireless Access Gateway Configuration
▀ R-eWAG Administration
monitor protocol
Monitor Subscriber
The system’s protocol monitor can be used to display information for a specific subscriber session that is currently
being processed. Depending on the number of protocols monitored, and the number of sessions in progress, a significant
amount of data is generated. It is highly recommended that logging be enabled on your terminal client in order to
capture all of the information that is generated.
To view monitor subscriber based logging information, in the Exec Mode use the following command:
monitor subscriber
The following filters are available for monitor subscriber based logging in R-eWAG.
By MSID/IMSI
By IP Address
By MSISDN
Next-IPSG Call
By Username
To view detailed R-eWAG service-level information. show ipsg service all verbose
To view R-eWAG service-level statistics, including session and show ipsg statistic
RADIUS message-level statistics.
To view R-eWAG session counter information. show ipsg sessions counters
To view detailed R-eWAG session information, for all sessions. show ipsg sessions full all
To view detailed subscriber information, for all subscribers. show subscribers full all
To view session progress information for in-progress calls. show session progress
To view IPSG Manager related information. show session subsystem facility ipsgmgr
64
RADIUS-based Enhanced Wireless Access Gateway Configuration
R-eWAG Administration ▀
To view SNMP trap history. show snmp trap history | grep IPSG
To view SNMP trap statistics, for all services including R-eWAG show snmp trap statistics
and SGTP.
To view Congestion Control statistics for IPSG Manager. show congestion-control statistics ipsgmgr
To view information for subscribers with NAT enabled. show subscribers nat required
To view information for ECS flows with NAT enabled. show active-charging flows full nat required
To view information for all ECS flows. show active-charging flows all
To view ECS statistics for specific analyzer. show active-charging analyzer statistics
name <analyzer_name>
To view ECS statistics for specific rulebase. show active-charging rulebase name
<rulebase_name>
65
Chapter 4
DHCP-based Enhanced Wireless Access Gateway
Overview
This chapter describes the DHCP-based Enhanced Wireless Access Gateway (D-eWAG) solution.
The following topics are covered in this chapter:
Product Overview
How it Works
Dependencies and Limitations
67
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Product Overview
The D-eWAG solution described in this chapter is designed for centralized WLAN deployments, wherein Access Points
(APs) spread across geographical locations provide Wi-Fi access, and Wireless LAN Controllers (WLCs) located in a
central server farm control all the APs.
The D-eWAG acts as first-hop L3 router to WLC with direct connectivity between them and is located in the central
server farm. With the use of Service Set Identification (SSID)-based WLAN access, subscribers can be authenticated
based on the SSID that they use in order to connect to the WLAN. The AP/WLC maintains a separate SSID for
providing 3G access. This enables the UE to select the correct SSID for obtaining 3G access through the Wi-Fi network.
The D-eWAG also acts as the AAA Proxy and the DHCP server to the UE attaching to the WLAN network. This helps
in processing all the control packets from the UE and maintaining the subscriber session to provide 3G access. While
acting as DHCP server, D-eWAG creates the PDP-Context with GGSN to obtain the IP address to be allocated to the
UE through DHCP-Response in the access side. Note that this interface with GGSN is similar to the TTG's Gn' interface
with GGSN in 3GPP.
When the UE wants to gain 3G access through the Wi-Fi network, the subscriber selects the 3G-SSID from the list of
advertised SSIDs.
The WLAN attach procedure occurs in three stages:
1. Association process
2. 802.1x EAP-SIM/AKA authentication process
3. IP address allocation process
These three steps are transparent to the subscriber accessing the Wi-Fi network and do not involve any subscriber
intervention. At the end of the WLAN attach procedure, the UE connects to the 3G network.
68
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
Deployment Models
The D-eWAG can be deployed in any of the following ways:
Stand-alone D-eWAG deployment on an ASR 5000 chassis.
Combo D-eWAG + GGSN deployment on the same ASR 5000 chassis.
Important: In this release, the following deployment option is not qualified and is not supported, it is available
only for lab testing purposes.
Important: For assumptions and dependencies pertaining to the network models discussed in this section, refer
to the Dependencies and Limitations section.
3G-SSID
The SSID created in Wi-Fi network for 3G access through D-eWAG is referred to as 3G-SSID. The following options
(not restricted to) can be considered for 3G-SSID creation in Wi-Fi networks:
Each SSID (or WLAN) represents particular APN network access of an operator. One SSID per APN case.
Each SSID (or WLAN) represents particular operator itself. This is one SSID per operator scenario where multiple APN
served by that operator can be accessed through this SSID. This means that the different users connecting through this
69
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
SSID can be subscribed to different APN served by that operator. All the users can gain access to their subscribed APN
network as the 3GPP-AAA server will return the subscribed APN to D-eWAG and selects GGSN based on that.
Association Process
During the 802.11 Association process, the access points allocate resources for UE communication and synchronize
with the UE. This is as per the standard 802.11 process and D-eWAG is not involved in this process.
70
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
APN Selection
APN for the D-eWAG session is selected in following way:
71
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
APN for a particular session is returned by the 3GPP-AAA server during authentication. The APN can be sent
using the RADIUS “Service-Selection” AVP in Access-Accept message from the 3GPP-AAA server.
If the APN is not supplied during authentication, the locally configured APN under the subscriber-template
configuration is applied to the D-eWAG session.
Important: Note that the DHCP service must be configured in DHCP-Server mode in the
same context as the D-eWAG service.
D-eWAG acts as accounting-proxy to proxy the RADIUS accounting messages between WLC and 3GPP-AAA.
Control Plane
Following are the control signaling packets to be handled by D-eWAG during the WLAN attach procedure by UE in the
3G-SSID WLAN network:
802.1x authentication
DHCP IP assignment
RADIUS accounting
72
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
The UE MAC address present in the “Calling-Station-ID” AVP of Access-Request message is used to identify
the UE session at D-eWAG for subsequent RADIUS messages from the WLC.
At the end of 802.1X authentication, the Access-Accept message from 3GPP-AAA server carries the 3G-specific
attributes of the authenticated user such as IMSI, MSISDN, and APN. This information is used by D-eWAG
for creating a GTP PDP context with the GGSN.
DHCP Requirements
The WLC should act as DHCP-Relay and should be configured with D-eWAG service IP address as the “external dhcp-
server” for the 3G-SSIDs.
D-eWAG processes all the DHCP messages sent to standard DHCP server UDP port 67.
When DHCP-Discover message is received from the UE, DHCP server in the ASR5000 chassis goes into pending state to
wait until the signaling on the MNO side (GTP tunnel creation) is done to get an IP address for the UE.
On the arrival of the Create PDP Context Response, which carries the assigned IP address c.c.c.c for the client, DHCP is
fully resumed to offer c.c.c.c back to the client.
On the completion of DHCP signaling, the session on the DP is fully activated to tunnel the client's entire traffic to the
GGSN over GTP-U.
In subsequent DHCP message exchanges over time (for example, DHCP Request and DHCP ACK), no further signaling
will happen on the MNO side. The DHCP-REQUEST on the D-eWAG needs to always turn around to compose a
corresponding response to reassign or renew this same address with an endless lease back to the client.
Important: UE suggesting the IP address to DHCP server in DHCP-Discover or DHCP-Request messages is not
supported in this release.
UE connecting through D-eWAG should include the “PARAMETER REQUEST LIST” DHCP option in DHCP-
Discover/Request to ask for subnet-mask, default-router, and DNS configuration parameters from DHCP Server (D-
eWAG) as DHCP-Inform message is not supported in this release.
DHCP service should be configured in the same context as the D-eWAG service. This is because D-eWAG is using the
existing DHCP service in the ASR5000 chassis to act as DHCP-server in this model.
RADIUS Accounting
RADIUS accounting messages are exchanged in the WLC-D-eWAG interface as described here:
WLC node can be configured with D-eWAG service IP address as the RADIUS accounting-server for the 3G-
SSID sessions.
After the IP address is allocated to the WLAN UE using DHCP signaling, WLC will send the RADIUS
Accounting-Start/Interim/Stop messages for the UE session to D-eWAG.
The accounting messages received are proxied to the 3GPP-AAA server (like authentication process) by D-
eWAG. Acct-Interim message are used for D-eWAG session updates like identifying AP change, and Acct-
Stop message are used to teardown the D-eWAG session as the corresponding session at WLC is down.
Note that this accounting proxy is optional. WLC can have different AAA server configured for RADIUS
accounting.
When D-eWAG receives a RADIUS accounting message from WLC, it is forwarded to the AAA server. In this
scenario, if the call goes down for any reason apart from Acct-Stop from WLC, D-eWAG creates Acct-Stop on
its own for this WLC-initiated accounting and sends it to the AAA server. This ensures that the AAA server
will know that the WLC-initiated accounting session needs to be stopped as the session has gone down.
73
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
However, if there is no accounting message received for that session from WLC then D-eWAG will not send
Acct-Stop on its own for WLC accounting session on call teardown.
Important: Note that D-eWAG does not forward the CoA request to WLC. WLC does not support CoA.
Filter-ID
The “Filter ID” AVP contains name of the data filter to apply to the subscriber session. The “filter-id” attribute
(attribute ID 11) contains the name of an Access Control List (ACL).
QoS
If CoA is received with QoS value the same is sent to GGSN in UPC Request and on receiving successful UPC
Response, CoA Ack is sent. Otherwise, CoA-Nack is sent.
Firewall Policy
CoA if received with Firewall policy name must be applied to the subscriber session. If the system does not support that
Firewall policy for the subscriber then CoA-NACK is sent.
Rulebase
CoA can have Rulebase AVP to specify new rulebase to apply to subscriber.
74
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
Important: Disconnect Request sent by the D-eWAG to the WLC may not contain the same attribute list that it
received in Disconnect Request from 3GPP AAA.
GGSN Selection
The GGSN node is selected as per the 3GPP standard of resolving the IP address using DNS query.
This DNS query contains the DNS-APN string in the form “<apn-name>.mncXXX.mccYYY.gprs”. The APN name is
derived from either local-configuration or obtained from AAA server during Access-Accept message. MCC and MNC
values are derived in the following priority:
1. From the NAI sent by UE in Access-Request message in the form “[email protected]”.
2. Local configuration.
Configured using the plmn id mcc mcc mnc mnc CLI command under the D-eWAG service.
GTP Messages
The following messages are supported over the Gn' reference point:
Create PDP Context Request/Response.
Update PDP Context Request/Response:
GGSN-initiated UPC handled for updating QoS.
GGSN-initiated UPC Request is accepted only for QoS Update case. QoS is updated for the D-eWAG
session and accept status is sent in UPC Response. UPC Requests with EUA Update, PCO Update,
APN Restriction Update, TFT Update, Direct Tunnel Update will be rejected by D-eWAG.
75
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Note that only EUA Update rejection from D-eWAG will cause session teardown at GGSN and
subsequently D-eWAG session will be torn down through GGSN-initiated DPC. Also, note that EUA
Update is sent by GGSN in UPC Request only when GGSN had sent 0 IP address in EUA IE of the
CPC Response.
D-eWAG-initiated UPC when new AP Location Information is received in the Accounting-interim
message for the session, and when COA with QoS update is received from 3GPP AAA.
UPC response handling scenarios:
If GGSN responds with UPC failure with cause other than “non-existent”, there will be no
QoS update for the D-eWAG session. The session persists in this case.
If GGSN responds with UPC failure with cause set to “non-existent”, the D-eWAG session
gets removed. Disconnect Message is sent to the WLC.
If there is no UPC response from GGSN, GTP path failure is assumed and the D-eWAG
session is removed.
Delete PDP Context Request/Response
Error Indication
Version Not Supported
GTP Payload Forwarding
GTP Echo
Important: As the WLC cannot send 3gpp-qos, UPC from D-eWAG to GGSN for QoS change from WLC does
not happen.
IP Address Allocation
Static IP Allocation
Important: Static IP Allocation is not supported in this release. D-eWAG responds to DHCP static IP request
with DHCP NAK.
The UE can sometimes request for an IP address using the “requested ip address” (option 50) field in DHCP message.
The scenario could be that the UE was earlier attached to the 3G network using macro-cell and is now connecting
through WLAN. Thus, it will try to retain the IP address it was allocated during 3G access by requesting the same
through DHPC message. In this case, D-eWAG will also request for the same IP address to GGSN by filling it in the
“End-user-address” IE in CPC Request. If the GGSN is not able to allocate the requested IP address, then D-eWAG
drops the call and DHCP-Offer message is not sent back.
76
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
NSAPI Allocation
D-eWAG is responsible for allocating NSAPI values before sending the Create-PDP-Context-Request message to the
GGSN. Although the D-eWAG acts as an SGSN in terms of GTP tunnel establishment, it also manages NSAPI
allocation as WLAN UEs do not send NSAPI in this case. The default NSAPI allocated by D-eWAG is 15.
RAI
The RAI IE in CPC Request sent to GGSN is encoded using the MCC MNC or PLMN ID configured at D-eWAG.
ULI
The User Location Information (ULI) IE in CPC Request sent to GGSN is encoded using the “Called-Station-ID” AVP
received in Authentication-Request message at D-eWAG. The “Called-Station-ID” AVP contains the Access Point
Identifier (AP Identifier), which is composed of the Location Area Code Cell Identity (LAC_CI) — that is, Location
Area Code (LAC) and Cell Id (CI) separated by an underscore. For example, if the access point is assigned LAC = 123
and CI = 56789, then the “Called-Station-ID” AVP will contain 123_56789. As per 3GPP TS 23.003, the LAC and CI
are each 2 bytes in length.
Note that the “Called-Station-ID” AVP is optional in RADIUS Auth/Accounting Requests. WLC supports different
format of “Called-Station-ID”. However, for ULI functionality to work, “Called-Station-ID” AVP should be received in
AP Identifier format. If Called-Station-ID is received in AP Identifier format then it is sent to GGSN in ULI IE of CPC
request.
The “User Location Information” IE is encoded in Cell Global Identifier (CGI) format to indicate WLAN AP location
information where the UE is currently located.
The “Geographic Location Type” field is used to convey what type of location information is present in the
“Geographic Location” field. To indicate Cell Global Identity format, it should be set to 0.
The “Geographic Location” field is used to convey the actual geographic information as indicated in the “Geographic
Location Type” field. The MCC MNC octets should be set to PLMN ID of the PLMN where D-eWAG is located. The
LAC and CI octets should be set to Called-Station-ID AP-Identifier LAC and CI components.
After the UE moves to a different access point, WLC sends a RADIUS Accounting Interim with the new Access Point
location in “Called-Station-ID” AVP. D-eWAG checks the older ULI and if it is different, it will send UPC Request
with ULI with the new Access Point location.
77
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Data-Plane
Important: In this release, Overlapping IP Address support is not fully qualified and is not supported, it is
available only for lab testing purposes.
If the IP address allocated by GGSN during the PDP Context Creation is expected to be unique for each UE session
(across the different APN/PLMN), then Overlapping IP Address support is not required. In that case, identification of
the session for the data-traffic at D-eWAG can be based only on the Source IP address.
To support Overlapping IP addresses, identification of data-traffic is done based on the {VLAN-ID, Source-IP-Address}
pair, which ensures that the overlapping IP addresses can exist across operators/APN.
Following table shows the overlapping IP address support in various possible deployment models of D-eWAG:
78
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
Important: For Local Traffic Breakout support, D-eWAG requires Dynamic NAT functionality for which the
ECS and NAT in-line service licenses are required.
APN Selection
A single APN is used for both 3G access and direct IP access. If Local Traffic Breakout is enabled, WLAN subscribers
can simultaneously access 3G services and direct IP services.
IP Address Allocation
A WLAN subscriber is always associated with a single IP address, there is no distinction between the Wi-Fi IP address
and PDP IP address.
Note that NAT is applied to direct IP traffic, the subscriber’s IP address is NATd and sent to the Internet. In the
downlink direction, the destination IP address is changed from the NATd IP address to the subscriber’s IP address and
then forwarded to the subscriber.
79
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Important: For D-eWAG, irrespective of the NAT pool type, NAT IP address is allocated only on demand—
after the data requiring NAT comes in.
80
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
Important: Note that NAT is applied only for the direct IP data based on the access rules defined.
81
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Recovery Support
The NAT framework takes care of recovering the NAT status and NAT flow. For the Local Traffic Breakout counters,
new micro checkpoint is added, which is sent as part of clp stats for D-eWAG callline.
Accounting Support
Direct IP data is accounted separately.
The following RADIUS AVPs support direct IP counts:
SN-LBO-Acct-IN-Pkts: Indicates number of packets sent by UE directly to the Internet
SN-LBO-Acct-Out-Pkts: Indicates number of packets received by UE directly from the Internet.
SN-LBO-Acct-IN-Octets: Indicates number of octets sent by UE directly to the Internet.
SN-LBO-Acct-Out-Octets: Indicates number of octets received by UE directly from the Internet.
Note that whereas direct IP data is accounted separately, there is only a cumulative Total Uplink and Total Downlink
data count available for the UE. It is not possible to identify 3G data sent for the subscriber from accounting messages
or CDR.
82
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
For the downlink path, DSCP markings can be configured to control the DSCP markings for downlink packets. IP
header of the packet is updated with value in the TOS field.
For uplink traffic—traffic from D-eWAG to GGSN through GTP tunnel—DSCP markings can be configured. In this
case, only outer IP header is used for routing the packet over Gn' interface. Hence, TOS field of only outer IP header is
changed, that is subscriber packet is not marked with DSCP value at D-eWAG.
DSCP marking can be configured with a “pass through option”, which when configured uses the marking received on
ingress to mark packets on egress.
83
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
When the Web Element Manager is used as the receiver, it is capable of further processing the statistics data through
XML parsing, archiving, and graphing.
The Bulk Statistics Server component of the Web Element Manager parses collected statistics and stores the information
in the PostgreSQL database. If XML file generation and transfer is required, this element generates the XML output and
can send it to a Northbound NMS or an alternate bulk statistics server for further processing.
Additionally, if archiving of the collected statistics is desired, the Bulk Statistics server writes the files to an alternative
directory on the server. A specific directory can be configured by the administrative subscriber or the default directory
can be used. Regardless, the directory can be on a local file system or on an NFS-mounted file system on the Web
Element Manager server.
Important: For more information on bulk statistics configuration, refer to the Configuring and Maintaining Bulk
Statistics chapter in the System Administration Guide.
84
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
Important: For more information on thresholds, refer to the Thresholding Configuration Guide.
Important: In this release, Congestion Control support is not qualified and is not supported, it is available only
for lab testing purposes.
The Congestion Control feature enables to specify how the system reacts in a heavy load condition. Congestion control
operation is based on configuring congestion condition thresholds and service congestion policies.
Congestion Control monitors the system for conditions that could potentially degrade performance when the system is
under heavy load. Typically, these conditions are temporary (for example, high CPU or memory utilization) and are
quickly resolved. However, continuous or large numbers of these conditions within a specific time interval may have an
impact on the system’s ability to service subscriber sessions. Congestion control helps identify such conditions and
invokes policies for addressing the situation.
85
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Important: For more information on the Congestion Control feature, refer to the Congestion Control chapter in
the System Administration Guide.
Redundancy Support
Important: In this release, D-eWAG supports basic Session Recovery, ICSR is not supported.
Session Recovery feature provides a mechanism to recover failed Session Manager (SessMgr) task(s) without any call
loss. Recovery framework is same as used by other products. A minimum of four PSCs (three active and one standby) is
required in an ASR5000 chassis to support the Session Recovery feature. This is because the DEMUX Manager and
VPN Manager tasks run on a PSC where no SessMgr runs when session recovery is enabled and one PSC is used as
standby PSC. The other two PSCs run SessMgr and AAAMgr tasks.
Session Recovery is a licensed feature and can be controlled from the CLI, that is enabled/disabled Session Recovery
across the whole chassis. When the CLI is used to configure the Session Recovery feature, Session Controller updates
each SessMgr task.
In the case of D-eWAG, the IPSG Manager, SGTPC Manager, and VPN Manager run on one PSC. SessMgr runs on
one separate PSC. AAAMgr runs on one separate PSC and on one standby PSC. Therefore, a minimum of four PSCs
(three active and one standby) are required.
For D-eWAG Session Recovery support, apart from common access-side attributes (common between D-eWAG and R-
eWAG sessions), attributes specific to D-eWAG session such as Default-GW-IP address, UE-MAC, and so on are
supported. D-eWAG GTP context information is recovered similar to R-eWAG as Gn' interface is used by both.
86
DHCP-based Enhanced Wireless Access Gateway Overview
Product Overview ▀
Charging
User traffic towards mobile packet core is accounted by GGSN in collaboration with existing 3G Charging Gateway
Function. D-eWAG supports the following accounting for the user-traffic:
RADIUS accounting
GTPP accounting (CDR)
Offline Charging
In Offline Charging, charging information is collected concurrently with resource usage. The charging information is
then passed through a chain of logical charging functions, and the CDR files are generated by the network, which are
then transferred to the network operator's Billing Domain.
The CTF (an integrated component in each charging relevant NE) generates charging events and forwards them to the
CDF. The CDF, in turn generate S-CDRs, which are then transferred to the CGF. Finally, the CGF create S-CDR files
and forwards them to the Billing Domain. The CTF and CDF are integrated in the D-eWAG. However, the CGF may
exist as a physically separate entity or integrated to the D-eWAG. If the CGF is external to the D-eWAG, then the CDF
forwards the CDRs to the CGF across the Gz/Wz interface (using GTPP protocol).
In the ASR5000 chassis, D-eWAG is integrated with the CTF and CDF functions and it generates S-CDR based on the
triggered events and sends the same to the CGF over the Gz/Wz interface. Note that S-CDR is used by SGSN, and the
same format is used for D-eWAG.
The D-eWAG Offline charging involves the following functionalities for WLAN 3GPP IP Access:
Charging Trigger Function
Charging Data Function
Gz/Wz Reference Point
87
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Product Overview
Important: In this release, the D-eWAG + R-eWAG combo deployment option is not qualified and is not
supported, it is available only for lab testing purposes.
The D-eWAG and R-eWAG services can be deployed on the same chassis. This is possible because R-eWAG operates
based on APN profile and D-eWAG operates based on subscriber-template. This clearly separates the user profile
selection process for these services without affecting each others configurations.
The only known restriction is that both these services cannot be configured in the same context. Also, note that the
context-replacement issue at GGSN due to same IMSI+NSAPI will not be the issue in R-eWAG + D-eWAG combo
setup as the UE can attach to only one WLAN at a time. Thus, it cannot connect through both R-eWAG and D-eWAG
at the same time.
Important: In this release, NAT policy must not be configured for D-eWAG. In D-eWAG + R-eWAG combo
deployments NAT is required for R-eWAG, it must be ensured that NAT policy is not configured for D-eWAG ECS
session.
88
DHCP-based Enhanced Wireless Access Gateway Overview
How it Works ▀
How it Works
The following illustration shows network setup for the D-eWAG-based solution for MPC access.
This section presents call procedure flows for the following scenarios:
Session Setup
Session Teardown
Session Teardown - AAA Initiated
Session Teardown - GGSN Initiated
Session Teardown - UE Initiated
Session Teardown - WLC Initiated
Session Update
Session Update - AAA Initiated
Session Update - GGSN Initiated
Session Update - WLC Initiated
Session Setup
This section presents the call flow for session setup scenario.
89
DHCP-based Enhanced Wireless Access Gateway Overview
▀ How it Works
90
DHCP-based Enhanced Wireless Access Gateway Overview
How it Works ▀
91
DHCP-based Enhanced Wireless Access Gateway Overview
▀ How it Works
Session Teardown
This section presents call flows for session teardown scenarios.
Session Teardown - AAA Initiated
Session Teardown - GGSN Initiated
Session Teardown - UE Initiated
Session Teardown - WLC Initiated
92
DHCP-based Enhanced Wireless Access Gateway Overview
How it Works ▀
93
DHCP-based Enhanced Wireless Access Gateway Overview
▀ How it Works
Session Update
This section presents call flows for session update scenarios.
Session Update - AAA Initiated
Session Update - GGSN Initiated
Session Update - WLC Initiated
94
DHCP-based Enhanced Wireless Access Gateway Overview
How it Works ▀
Important: Note that D-eWAG internally uses R7-QoS regardless of which QoS is requested and negotiated.
When D-eWAG receives UPC from GGSN, it compares it with QoS requested by AAA, and QoS with smaller version
is selected for UPC response. In case of same version, QoS with small Maximum Bit Rate (MBR) is selected.
Important: In this release, D-eWAG does not generate CoA RADIUS Request to WLC.
95
DHCP-based Enhanced Wireless Access Gateway Overview
▀ How it Works
96
DHCP-based Enhanced Wireless Access Gateway Overview
Dependencies and Limitations ▀
Deployment Models
General assumptions:
D-eWAG acts as first-hop L3 router for WLC.
WLC and D-eWAG nodes are in a centralized location and the connectivity between WLC and D-
eWAG is based on VLANs.
D-eWAG acts as authentication-proxy and dhcp-server for all the 3G-SSID being served by WLC.
Data path follows flexconnect (or H-REAP) model in Wi-Fi access with the data forwarded to the
controller in the centralized location from all the APs.
The RADIUS control path and {dhcp+datapath} can be in the same or different VLAN between WLC
and D-eWAG depending on whether the AP-Group or AAA-VLAN-Override feature is enabled or
disabled.
Note that enabling the AP-Group at WLC or AAA-VLAN-Override feature at 3GPP-AAA server will
not affect D-eWAG functionality as Overlapping IP address is not supported in this release.
This D-eWAG solution is not tested against non-Cisco WLC nodes. However, it should work with
WLCs from any vendors as long as it satisfies the requirements mentioned in the Requirements in
WLC section, though it is advised to use Cisco WLC nodes for better interoperability.
Assumptions in uplink:
UE default-router (gateway) configuration is provided by ASR5000 chassis in DHCP Response with IP
address in the same subnet as the UE IP address.
WLC forwards the ARP requests for default-gateway from UE to the appropriate ASR5000 chassis
VLAN interface.
ASR5000 chassis responds to default-gateway ARP requests with MAC address of the VLAN interface
on which it is received.
UE uses the ASR5000 chassis returned MAC addresses as destination MAC for uplink data packets.
ASR5000 chassis identifies the session for the data packet based on Source-IP flow.
Overlapping IP address is not supported in this release.
Assumptions for downlink:
D-eWAG is aware of the VLAN mapped to data path of the UE-Session. This is the same VLAN used
for communication of DHCP-signaling between WLC and D-eWAG.
D-eWAG sends the data packet with Dest-IP as UE-IP and Dest-MAC as UE-MAC to WLC on the data
VLAN.
97
DHCP-based Enhanced Wireless Access Gateway Overview
▀ Dependencies and Limitations
Requirements in WLC
WLC node capabilities for D-eWAG service:
Each 3G-SSID served by WLC should be mapped to a VLAN. The default-gateway for this VLAN should be
configured with the IP address of the corresponding VLAN interface at D-eWAG so that any signaling packet
generated for that SSID (like RADIUS Access-Request, DHCP, etc) will reach D-eWAG.
RADIUS server IP address for the 3G-SSID at WLC should be configured with the D-eWAG service IP address.
This is required since D-eWAG acts as RADIUS Proxy and inspects the authentication exchanges between UE
and 3GPP-AAA for obtaining the 3G attributes required to create PDP-context with the GGSN.
DHCP server IP address for the 3G-SSID at WLC should be configured with the D-eWAG service IP address.
This is required since D-eWAG acts as DHCP-server and notifies the IP address allocated by GGSN using
DHCP signaling to the UE.
WLC should be configured to use its VLAN interface's IP as Source-IP for RADIUS/DHCP Relay signaling
packets and not the management interface IP. This is required since D-eWAG verifies the shared-secret for
RADIUS communication based on this IP address.
Requirements at GGSN
The IP-Pool subnet range configured at GGSN for APN network access should have one IP-address dedicated as
default-gateway address for that subnet and not allocated to any UE. This IP address should be configured at D-eWAG
node as default-gateway IP address for that APN.
For example, if the IP-pool subnet range for an APN is 12.0.0.1 to 12.0.0.100, then one IP-address from this range, say
12.0.0.1 is dedicated as default-gateway address for this subnet range. Thus, the GGSN IP-pool configuration in the D-
eWAG-based solution should be changed to { 12.0.0.2 to 12.0.0.100 } range and the IP-address 12.0.0.1 is configured at
D-eWAG node. Also, 12.0.0.1 is conveyed to UE as default-gateway during DHCP-Offer message by D-eWAG so that
it acts as default-gateway for all the uplink data-packets from the UE.
98
Chapter 5
DHCP-based Enhanced Wireless Access Gateway
Configuration
This chapter provides information on configuring the DHCP-based Enhanced Wireless Access Gateway (D-eWAG)
solution.
The following topics are covered in this chapter:
Before You Begin
D-eWAG Configuration
D-eWAG Administration
99
DHCP-based Enhanced Wireless Access Gateway Configuration
▀ Before You Begin
100
DHCP-based Enhanced Wireless Access Gateway Configuration
D-eWAG Configuration ▀
D-eWAG Configuration
This section describes how to configure the D-eWAG service.
1. Create and configure the D-eWAG service as described in the Creating and Configuring the D-eWAG Service
section.
Important: From configuration perspective, note that the D-eWAG service is the IPSG
service configured in D-eWAG mode. There is no separate D-eWAG configuration mode.
2. Create and configure a DHCP service for D-eWAG as described in the Configuring DHCP Service section.
3. Create/configure subscriber template for D-eWAG as described in the Configuring the Subscriber Template
section.
4. Create and configure an SGTP service for D-eWAG as described in the Configuring the SGTP Service section.
5. Save your configuration to the flash memory, an external memory device, and/or a network location using the
Exec Mode command save configuration. For additional information on how to verify and save
configuration files, refer to the System Administration Guide and the Command Line Interface Reference.
Important: Commands used in the configuration examples in this section provide base functionality to the extent
that the most common or likely commands and/or keyword options are presented. In many cases, other optional
commands and/or keyword options are available. Refer to the Command Line Interface Reference for complete
information regarding all commands.
configure
end
Notes:
The ewag keyword enables the D-eWAG service (IPSG service in D-eWAG mode), and enters the IPSG
RADIUS Server Configuration Mode, which is common for the eWAG and IPSG services.
101
DHCP-based Enhanced Wireless Access Gateway Configuration
▀ D-eWAG Configuration
You can configure a maximum of 64 eWAG/IPSG services in the system, one per context. Only one IPSG
service must be configured per context. Multiple eWAG services must not be configured in the same context as
they will not be able to differentiate between uplink and downlink packets.
configure
context <context_name>
#To bind the D-eWAG service to a logical AAA interface and specify the number of allowed
subscriber sessions:
#To configure the list of W-APN names that can be connected through D-eWAG and the
default-gateway IP addresses to be used by UE for connecting to the W-APN network:
#To bind the D-eWAG service to a logical AAA interface and configure the number of
subscriber sessions allowed:
profile subscriber
102
DHCP-based Enhanced Wireless Access Gateway Configuration
D-eWAG Configuration ▀
#To enable mapping of UE MAC address to IMEIsV IE of GTP message in order to send it to
the GGSN:
map ue-mac-to-imei
setup-timeout <setup_timeout>
end
Notes:
<dictionary_name> specifies the RADIUS dictionary to use for the D-eWAG service. For information on
which dictionary to use in your setup, contact your Cisco account representative. For D-eWAG, the default
dictionary is starent.
In the RADIUS accounting parameter configurations, the disconnect-message option enables sending
RADIUS accounting messages to the configured RADIUS accounting client if the call goes down due to any
failure. If this option is not configured, the D-eWAG will not send Disconnect-Message in call failure
scenarios.
In the binding configuration, the source-context option specifies the source context where RADIUS
accounting requests are received. This keyword should be configured if the source of the RADIUS requests is
in a different context than the D-eWAG service. If not configured, the system will default to the context in
which the D-eWAG service is configured.
The map ue-mac-to-imei CLI command supports enabling/disabling UE MAC to IMEI mapping. When
enabled, the UE MAC received in “Calling-Station-Id” RADIUS attribute is mapped to IMEIsV and sent in
GTP CPC message towards the GGSN.
A maximum of four W-APN can be configured per D-eWAG service. Also, note that a maximum of four default
gateways can be configured per W-APN.
configure
context <context_name>
#To configure DHCP servers with which the DHCP service is to communicate:
103
DHCP-based Enhanced Wireless Access Gateway Configuration
▀ D-eWAG Configuration
#To bind the DHCP service to a logical IP interface facilitating the system's connection
to the DHCP server:
exit
Notes:
The DHCP service must be configured in the same context as the D-eWAG service, and must use the same IP
address as used for the D-eWAG service bind.
configure
context <context_name>
accounting-mode gtpp
#To configure the default APN to be used for UE connections when the AAA server does not
return the subscriber APN name in the service-selection AVP in RADIUS Access-Accept
message:
w-apn <wapn_name>
exit
#To configure realm part for subscriber. This command must be configured in the same
context where the AAA Group is defined.
domain <domain_name>
end
configure
context <context_name>
sgtp-service <sgtp_service_name>
104
DHCP-based Enhanced Wireless Access Gateway Configuration
D-eWAG Configuration ▀
#To configure the restart counter change window to avoid service deactivations and
activations that could cause large bursts of network traffic if the restart counter
change messages from the GGSN are erroneous:
max-remote-restart-counter-change <variance>
end
Notes:
The SGTP service must be associated in the D-eWAG service configuration.
configure
fw-and-nat firewall_nat_policy_name
105
DHCP-based Enhanced Wireless Access Gateway Configuration
▀ D-eWAG Configuration
end
Notes:
NAT is applied only on packets in the uplink direction.
The Firewall-and-NAT policy can either be specified in the ECS rulebase, which can in turn be specified in the
Subscriber Template, or the policy can be specified directly in the Subscriber Template. Note that the
Subscriber configuration has higher priority than the ECS rulebase configuration. Therefore, if Firewall-and-
NAT policies are configured both in the Subscriber Template and in the ECS rulebase, the policy specified in
the Subscriber Template will be applied for the subscriber.
A maximum of three realms can be configured in a Firewall-and-NAT policy. In the above sample configuration
nat_pool_1, nat_pool_2, nat_pool_3, and nat_pool_default are the realm names.
In the above sample configuration:
NAT realm nat_pool_1 will be used for all packets matching the ruledef ruledef_1.
NAT realm nat_pool_2 would be used for all packets matching the ruledef ruledef_2.
NAT realm nat_pool_1 would be used for all packets matching the ruledef ruledef_3.
NAT realm nat_pool_default would be used for all the packets matching the ruledef ruledef_4.
NAT will be bypassed for all the packets matching the ruledef ruledef_5.
In case there are no rules matching a packet, then the NAT realm to be used for the flow is taken from
the following configuration:
access-rule no-ruledef-matches uplink action permit nat-realm nat_pool_3
That is, if no ruledef matches the packet, NAT realm nat_pool_3 will be used for those packets. If
there was no realm name configured as part of matching ruledef, and default-nat-realm is not
configured, then NAT will be bypassed.
Additional Configurations
This section covers the following configurations:
Configuring Bulk Statistics
Configuring Congestion Control
Configuring Session Recovery
Configuring Offline Charging for D-eWAG
configure
106
DHCP-based Enhanced Wireless Access Gateway Configuration
D-eWAG Configuration ▀
bulkstats mode
end
Notes:
For detailed information on D-eWAG-related bulk statistics available in the IPSG schema, refer to the IPSG
Schema chapter of the Statistics and Counters Reference, and for those available in the System schema, refer to
the System Schema chapter of the Statistics and Counters Reference.
Apart from the IPSG and System schema, as needed you can also configure variables available in the other
schema, including:
APN: For Access Point Name (APN) related statistics
Card: For card-level statistics
Context: For context service related statistics
Port: For port-level statistics
RADIUS: For per-RADIUS server statistics
The following is a sample schema format for D-eWAG statistics:
“D-eWAG Schema: Test\n ----------------------\nVPN Name:%vpnname%,\nService
Name:%servname%,\n Session Statistics: \n Total Current Sessions
:%total_current_sessions%,\n Total Sessions Setup: %total_sessions_setup%,\n -----
-----------------\n”
Important: In this release the Congestion Control Support feature is not qualified, it is available only for lab /
testing purposes.
configure
congestion-control
107
DHCP-based Enhanced Wireless Access Gateway Configuration
▀ D-eWAG Configuration
end
Notes:
Congestion policies are configurable for each service. These policies dictate how the services respond when the
system detects that a congestion condition threshold has been crossed. For more information on the Congestion
Control feature, refer to the Congestion Control chapter of the System Administration Guide.
In the above configuration, the Congestion Control thresholds featured are at the system level and are not
specific to D-eWAG.
eWAG supports only critical threshold values.
The output of this command displays information including whether or not Congestion Control is enabled/disabled,
Congestion Control threshold parameter settings, Congestion Control policy, and more.
configure
end
Notes:
For more information on the Session Recovery feature, refer to the Session Recovery chapter of the System
Administration Guide.
A valid feature key is required for this configuration. This command enables/disables the feature to try to
perform hitless session recovery for all session types supported by the software release. After enabling session
recovery through this configuration, make sure that session recovery status is “ready”.
configure
gtpp single-source
context <context_name>
108
DHCP-based Enhanced Wireless Access Gateway Configuration
D-eWAG Configuration ▀
exit
exit
accounting-context <ewag_accounting_context_name>
exit
subscriber default
accounting-mode gtpp
end
Notes:
For information on the GTPP dictionary to use contact your Cisco account representative.
109
DHCP-based Enhanced Wireless Access Gateway Configuration
▀ D-eWAG Administration
D-eWAG Administration
This section describes D-eWAG administrative procedures.
This section includes the following topics:
Logging Support
Protocol Monitoring Support
Gathering D-eWAG-related Statistics and Information
Logging Support
To view IPSG-related logs, in the Exec Mode use the following command:
To view SGTP-related logs, in the Exec Mode use the following command:
To view SessMgr-related logs, in the Exec Mode use the following command.
To view ECS and NAT related logs for Local traffic Breakout support, in the Exec Mode use the following command.
Monitor Protocol
The system’s protocol monitor displays information for every session that is currently being processed. Depending on
the number of protocols monitored, and the number of sessions in progress, a significant amount of data is generated. It
is highly recommended that logging be enabled on your terminal client in order to capture all of the information that is
generated.
110
DHCP-based Enhanced Wireless Access Gateway Configuration
D-eWAG Administration ▀
To view monitor protocol based logging information, in the Exec Mode use the following command:
monitor protocol
Monitor Subscriber
The system’s protocol monitor can be used to display information for a specific subscriber session that is currently
being processed. Depending on the number of protocols monitored, and the number of sessions in progress, a significant
amount of data is generated. It is highly recommended that logging be enabled on your terminal client in order to
capture all of the information that is generated.
To view monitor subscriber based logging information, in the Exec Mode use the following command:
monitor subscriber
The following filters are available for monitor subscriber based logging in D-eWAG.
Monitor Subscriber for full call flow can be checked with the options next-call, type, and username. Other options like
IMSI, MSISDN, and MSID are not applicable for calls as they are not known to D-eWAG at the initial stage of
authentication (D-eWAG gets this information only after receiving Access-Accept from the AAA server.
111
DHCP-based Enhanced Wireless Access Gateway Configuration
▀ D-eWAG Administration
To view SNMP trap history. show snmp trap history | grep IPSG
To view SNMP trap statistics, for all show snmp trap statistics
services including D-eWAG and
SGTP.
To view IPSG facility information. logging filter active facility ipsg
112
DHCP-based Enhanced Wireless Access Gateway Configuration
D-eWAG Administration ▀
For Local Traffic Breakout support. show active-charging sessions nat { required [ nat-realm
To view session information for <realm_name> ] | not-required }
sessions with NAT required or not
required.
For Local Traffic Breakout support. show subscribers nat { required [ nat-realm <realm_name> ] [ nat-ip
To view information for subscribes <ip_address> ] | not-required }
with NAT enabled or disabled.
For Local Traffic Breakout support. show active-charging analyzer statistics name <analyzer_name>
To view ALG statistics.
To view GTPP statistics. show gtpp statistics
113
Appendix A
RADIUS-based Enhanced Wireless Access Gateway AAA
AVP Support
This appendix presents a quick reference for AAA message-level AVP support for R-eWAG.
The following table describes the indicators used in the quick reference table.
Indicator Description
M Mandatory, one or more instances of the AVP MUST be present in the message.
O Optional, zero or more instances of the AVP MAY be present in the message.
115
RADIUS-based Enhanced Wireless Access Gateway AAA AVP Support
▀ D-eWAG Administration
116
Appendix B
DHCP-based Enhanced Wireless Access Gateway AAA
AVP Support
This chapter presents quick references for AAA AVP support in accounting and authentication messages for D-eWAG.
117
DHCP-based Enhanced Wireless Access Gateway AAA AVP Support
▀ AAA AVP Support in Accounting Messages
Table 10. D-eWAG AVP Support in Accounting Messages Quick Reference Table
118
DHCP-based Enhanced Wireless Access Gateway AAA AVP Support
AAA AVP Support in Accounting Messages ▀
Message
Authenticator
NAS-IP- X X X X X Contains the IP address of the RADIUS
Address Accounting Client configured in D-eWAG.
NAS-Port X X X Contains the D-eWAG RADIUS Accounting
Client port number used for sending the
RADIUS messages.
NAS-Port- X X X
Type
Reply-
Message
Service-
Selection
Service-Type X X X X X
Session-
Timeout
SN-LBO- X X Indicates number of octets sent by UE directly to
Acct-IN- the Internet.
Octets
SN-LBO- X X Indicates number of packets sent by UE directly
Acct-IN-Pkts to the Internet.
SN-LBO- X X Indicates number of octets received by UE
Acct-Out- directly from the Internet.
Octets
119
DHCP-based Enhanced Wireless Access Gateway AAA AVP Support
▀ AAA AVP Support in Accounting Messages
120
DHCP-based Enhanced Wireless Access Gateway AAA AVP Support
AAA AVP Support in Authentication Messages ▀
Table 11. D-eWAG AVP Support in Authentication Messages Quick Reference Table
Attribute Acces Acces Acces Access- Acc Acct- Acc PoD/D Notes
s- s- s- Challen t- Interi t- M
Reque Reject Accep ge Star m Sto
st t t p
3GPP- X X X X D-eWAG will cache this information for
Charging the UE session. This value will be used
Characterist during GTP tunnel creation with GGSN.
ics
3GPP- X D-eWAG will cache this information for
Negotiated- the UE session. This value will be used
QoS-Profile during GTP tunnel creation with GGSN.
3GPP-RAT- X X Ignored. Hard coded to be 3 by D-eWAG.
Type
Acct- X X X D-eWAG does not do anything with this.
Authentic
Acct-Input- X X D-eWAG does not do anything with this.
Octets
Acct-Input- X X D-eWAG does not do anything with this.
Packets
Acct- X D-eWAG does not do anything with this.
Interim-
Interval
Acct- X X D-eWAG does not do anything with this.
Output-
Octets
Acct- X X D-eWAG does not do anything with this.
Output-
Packets
Acct- X X X
Session-ID
Acct-Status- X X X
Type
Acct- X D-eWAG does not do anything with this.
Terminate-
Cause
121
DHCP-based Enhanced Wireless Access Gateway AAA AVP Support
▀ AAA AVP Support in Authentication Messages
Attribute Acces Acces Acces Access- Acc Acct- Acc PoD/D Notes
s- s- s- Challen t- Interi t- M
Reque Reject Accep ge Star m Sto
st t t p
Called- X X X X WLC can fill this AVP with “AP-
Station-ID MAC:SSID” in Access-Request. For ULI
support, WLC should send this AVP in
AP-Identifier format LAC_CI.
Calling- X X X X X Carries the MAC address of the WLAN-
Station-ID UE for verification at the 3GPP AAA
server.
Chargeable- X This attribute contains the MSISDN and/or
User- the IMSI of the user. The encoding of the
Identity MSISDN and the IMSI is defined in
GSMA PRD IR.61. This value will be
cached by eWAG when received in
Access-Accept message.
Class X D-eWAG does not do anything with this.
122
DHCP-based Enhanced Wireless Access Gateway AAA AVP Support
AAA AVP Support in Authentication Messages ▀
Attribute Acces Acces Acces Access- Acc Acct- Acc PoD/D Notes
s- s- s- Challen t- Interi t- M
Reque Reject Accep ge Star m Sto
st t t p
Service- X 3GPP-AAA provides the subscribed APN
Selection name (RFC 6572).
Service- X X
Type
Session- X D-eWAG does not do anything with this.
Timeout
Tunnel- X
Medium-
Type
Tunnel- X Assigned VLAN ID for the subscriber.
Private-
Group-ID
Tunnel- X VLAN
Type
User-Name X X X X X X X Contains the identify of the user in
IMSI@Realm format as defined in 3GPP
TS 23.003 as follows:
[email protected]
work.org
123